This project equips community journalists, activists, and engaged citizens with the tools, techniques, and knowledge for effective open-source research and secure technology practices, fostering resilience and informed action. It also serves as a research log for secure communication methodologies, independent analysis of community issues, and the development of accessible tech solutions to empower all.
For all of our family.
Click to open the dark-mode public map (search + layer toggles) served via GitHub Pages.
GitHub Pages landing (public): https://samedayhurt.github.io/laraza/
Direct map URL: https://samedayhurt.github.io/laraza/docs/maps/pueblo-map-public.html
Offline fallback (existing Folium build): docs/maps/pueblo-surveillance-map.html
- Open
docs/maps/pueblo-surveillance-map.htmlin your browser (or via GitHub Pages if enabled). - Toggle layers (e.g., RTCC, ALPR, drones, parks, community support) with the layer control; markers are clustered for dense areas.
- Click any pin to see description plus linked sources; polygons/lines show coverage areas like ShotSpotter or ALPR corridors.
- Regenerate after data changes with
.venv/bin/python scripts/build_pueblo_map.py(folium already installed in.venv).
Surveillance Infrastructure Updates:
- ShotSpotter coverage reported at ~6–7 sq mi (State of the City 2026); RTCC mobile camera trailers likely increased to 6 total; DFR drones remain active.
- Agenda monitoring refreshed (Feb 18, 2026): latest City Council agenda contained no surveillance/ICE/civil-liberties items; alerts logged in
docs/agenda_alerts.md. - Surveillance data and risks report updated to reflect 2026 footprint and advocacy asks for coverage maps, trailer logs, and drone deployments.
ICE / Immigration Updates:
- Pueblo County Sheriff Lucero reaffirmed Jan 29, 2026: PCSO will not join ICE “roundups,” will only cooperate on criminal charges/officer safety; track jail-to-ICE detainers.
- Early 2026 reports show 104 ICE arrests statewide YTD; immigration risks report updated with context and the 2025 federal warrantless-arrest ruling.
Resource Directory Updates:
- SafeSide Recovery (Posada partner) added eight dorm-style units in Jan 2026, doubling 24/7 low-barrier shelter capacity in Pueblo.
- Resource guide and structured directory updated; keep intake details documented for follow-up.
Data Flow & Tooling:
monitor_agendas.py+download_agendas.pyremain the workflow for weekly agenda pulls; city agenda (Item 626) added todocs/agendas/for audit trail.- Safety/ethics review rerun (Feb 18, 2026): reports remain rights-focused, no private resident data exposed.
Stay safe. The times demand it.
- Pueblo Surveillance Apparatus Map
- Purpose
- Disclaimer
- How to Use This Repo
- Repository Structure
- Pueblo 81008 Field Priorities
- Data & Map Outputs
- Roadmap: Guides & Self-Advocacy
- Field Use: Protest & Outreach Protection
- Operational Security Layers
In today’s digital landscape, privacy and operational security (OPSEC) are more important than ever. This guide will walk you through practical steps to secure your devices, communications, and data, ensuring that your online presence remains as private as possible. This is a field guide covering as much ground as we can, and attempting to distill it to the level anyone can use.
This project is worked on over time and space; while workflow guides may be shared, the world continues to evolve at light speed. Some information may be outdated by the time you see it, some techniques may be compromised by the time you use them, and some information may just be completely wrong. The goal here is to plant seeds for trees to grow from; learn, trust, but verify.
This guide works completely offline once downloaded—no internet required. Choose the method that fits your comfort level:
Just browse this page. Click any link to read that section. No download needed.
Limitations: Requires internet, can't make personal notes, leaves browsing history.
What you'll get: A folder with all guides, maps, and resources that works without internet.
- Go to github.com/samedayhurt/laraza
- Click the green "Code" button
- Click "Download ZIP"
- Find the downloaded file (usually in your Downloads folder), right-click it, select "Extract All"
- Open the extracted
laraza-mainfolder - Double-click any
.mdfile to open it (they open in Notepad or any text editor)
Tip: For better reading, install a free Markdown viewer like Typora or Mark Text.
- Go to github.com/samedayhurt/laraza
- Click the green "Code" button → "Download ZIP"
- The ZIP will auto-extract in your Downloads folder (or double-click it)
- Open the
laraza-mainfolder - Double-click any
.mdfile to read it in TextEdit
Option 1 - Download ZIP: Same as above, extract with your file manager.
Option 2 - Command line:
git clone https://github.com/samedayhurt/laraza.git
cd larazaObsidian is a free note-taking app that makes this guide interactive—linked notes, searchable, and you can add your own research.
Follow Option B above to download and extract the files.
- Go to obsidian.md
- Click "Get Obsidian for free"
- Download for your system (Windows/Mac/Linux)
- Install it like any other app
- Open Obsidian
- Click "Open folder as vault"
- Navigate to the
laraza-mainfolder you downloaded - Click "Open"
- If prompted about "Trust author," click "Trust"
- Use the left sidebar to browse folders
- Click any note to read it
- Use
Ctrl+O(orCmd+Oon Mac) to quickly search for any topic - Try the Graph View (icon in left sidebar) to see how topics connect
Making it yours: Add your own notes, research, and observations. Your changes stay local—they won't affect anyone else's copy.
- Install Obsidian from Google Play Store (free)
- Download the guide:
- In your phone's browser, go to github.com/samedayhurt/laraza
- Tap green "Code" button → "Download ZIP"
- Extract the ZIP using your file manager (or install "ZArchiver" from Play Store)
- Open Obsidian → "Create new vault" → "Open folder as vault"
- Navigate to the extracted
laraza-mainfolder → "Use this folder"
- Install Obsidian from App Store (free)
- Download the guide:
- In Safari, go to github.com/samedayhurt/laraza
- Tap green "Code" button → "Download ZIP"
- When download completes, tap it to extract
- Move the folder to "On My iPhone" in Files app
- Open Obsidian → "Open folder as vault"
- Navigate to the folder → "Open"
The guide is updated regularly. To get the latest version:
If you downloaded the ZIP: Download a fresh copy and replace your old folder (back up any personal notes first).
If you used git clone:
cd laraza
git pullDownloading this guide leaves minimal trace—far less than reading online. For maximum privacy:
- Download over VPN or Tor
- Use the offline copy exclusively
- Store on an encrypted drive
See Operational Security Layers for complete privacy guidance.
Full disk encryption ensures that if your device is lost, stolen, or seized, the data remains unreadable without your password.
BitLocker (Windows Pro/Enterprise):
- Open Control Panel → System and Security → BitLocker Drive Encryption
- Click Turn on BitLocker for your main drive
- Choose how to unlock: Password recommended
- Save your recovery key somewhere safe (NOT on the same device)
- Choose Encrypt entire drive → New encryption mode
- Click Start encrypting
VeraCrypt (Windows Home or any version):
- Download from veracrypt.fr
- Install and open VeraCrypt
- Go to System → Encrypt System Partition/Drive
- Choose Normal → Encrypt the Windows system partition
- Choose Single-boot (unless you dual-boot)
- Create a strong password and PIM (leave PIM blank for default)
- Create the rescue disk when prompted (required)
- Run the pre-test, then encrypt
FileVault (Built-in):
- Open System Preferences → Security & Privacy → FileVault
- Click the lock icon and enter your password
- Click Turn On FileVault
- Choose how to unlock: iCloud account or recovery key (recovery key is more private)
- Save your recovery key somewhere safe
- Encryption begins automatically (takes a few hours)
During Installation (Easiest): Most Linux installers offer "Encrypt the new installation" during setup. Check this box and set a strong passphrase.
After Installation (LUKS): Encrypting after install is complex and risky—reinstall with encryption enabled if possible. For existing systems, consider encrypting your home folder:
# Install ecryptfs
sudo apt install ecryptfs-utils
# Migrate your home directory (log in as different user first)
sudo ecryptfs-migrate-home -u yourusernameMost modern Android phones are encrypted by default. To verify:
- Go to Settings → Security → Encryption & credentials
- Should say "Encrypted" under "Encrypt phone"
If not encrypted:
- Charge to 80%+ and plug in
- Go to Settings → Security → Encrypt phone
- Set a strong PIN/password (pattern is weaker)
- Wait for encryption to complete (1-2 hours)
GrapheneOS: Encrypted by default with stronger implementation than stock Android.
iOS devices are encrypted by default when you set a passcode.
Strengthen it:
- Go to Settings → Face ID & Passcode (or Touch ID & Passcode)
- Tap Change Passcode
- Tap Passcode Options → Custom Alphanumeric Code
- Set a strong password (not just 6 digits)
Why this matters: A 6-digit PIN can be cracked in hours. An alphanumeric password with 10+ characters could take years.
For maximum control over your data, consider self-hosting your own cloud services. This eliminates third-party access to your files, communications, and research.
See the full guide: Self-Hosting Infrastructure
Quick overview of what you can self-host:
- File sync: Nextcloud, Syncthing
- Passwords: Vaultwarden (Bitwarden compatible)
- Communication: Matrix/Element, XMPP, Jitsi
- VPN: WireGuard, Tailscale
- Notes: Obsidian + Syncthing, Joplin Server
- Primers: Fast-start guides for Linux, direction finding, virtual machines, and other fundamentals.
- Secure Communication Techniques: Living playbooks for digital + RF channels, plus workflows like Strong & Anonymous File Sync and the new
GrapheneOS Mudi Field Kit. - Operational Security: Threat-model worksheets, daily discipline checklists, Pueblo-specific legal observer workflows, and source vetting procedures aimed at civilians rather than military units.
- Non-Standard Communications & Direction Finding: Specialized research threads that support Pueblo-focused investigations and counter-surveillance scouting.
- Pueblo 81008 Surveillance Memo: Political landscape notes, RTCC inventory, commercial telemetry analysis, police-abuse reporting routes, ICE collaboration research, and “5-minute” action blocks.
- Pueblo County Officials: Quick reference on which party controls each county office plus the business ties and high-stakes decisions tied to those officials, paired with the new
Legal Observer Toolkitfor documentation escalations. - Scripts: Automation such as
build_pueblo_map.pyto regenerate the folium overlay without external GIS tools.
- Political control: Use
opsec/Pueblo County Officials.mdbefore outreach meetings to surface conflicts of interest (e.g., Republic Shooting Range co-ownership, sheriff lawsuits) and align campaigns with the right office. - Surveillance stack:
opsec/Pueblo 81008 Surveillance.mdconsolidates RTCC tooling, Community Connect tactics, ALPR corridors, and now Pueblo-specific police abuse + ICE reporting workflows. - Rapid protest comms:
comms/GrapheneOS Mudi Field Kit.mdadapts DSOK’s GrapheneOS router workflow for medics, scouts, and legal observers who need hardened connectivity in 81008 without touching personal SIMs. - Accountability escalations: The surveillance memo now points directly to Pueblo PD Internal Affairs forms, Colorado POST certification complaints, the Attorney General’s pattern-and-practice form, and Colorado Rapid Response Network (CORRN) hotline instructions so community members can escalate abuse or ICE sightings immediately.
data/pueblo_apparatus.geojson— working GeoJSON covering the 81008 boundary approximation, RTCC, downtown Flock ALPR zone, and Pueblo Mall security footprint.docs/maps/pueblo-surveillance-map.html— editable folium map (GitHub Pages friendly) driven by the GeoJSON to visualize sensors and political targets along march routes. A static preview (docs/maps/pueblo-surveillance-map.png) now lives alongside it for README embeds.docs/pueblo-watchlist.md— rolling agenda/procurement tracker so you can match surveillance votes to the officials and business ties documented inopsec/.scripts/build_pueblo_map.py— regenerates the HTML overlay whenever the GeoJSON changes so everyone shares the same situational awareness.docs/digital-footprint-protection.md— ties the research workflow to device hygiene, metadata minimization, and the comms/OPSEC primers so teams keep their digital footprint tight while executing the roadmap.docs/data-legend.md— summarizes where each dataset/report comes from (census, media, vendor releases, automation scripts) so readers can audit provenance and extend the pipeline transparently.
We follow the AGENTS.md workflow so research flows into actionable guides that teach Pueblo residents how to advocate for themselves.
- Research + Logging Layer
- Populate the raw/structured notebooks in
data/(politics, surveillance/policing, immigration/ICE, community resources) and cite everything insidelogs/source_index.md. - Record investigations, FOIA/CORA pulls, and desk research sessions in
logs/search_log.mdso anyone can audit how findings were produced; log TODOs (e.g., district-level census pulls, upcoming council agendas) in context notes so future sprints can pick them up quickly.
- Populate the raw/structured notebooks in
- Report & Guide Production
- Draft and continuously update the five Markdown reports inside
reports/, prioritizing sections like “How to assert your right to record,” “How to push back on surveillance purchases,” and “Where to get immediate legal/financial help.” - Pair every risk description with a corresponding “self-advocacy move” (filing complaints, rallying allies, requesting hearings, redirecting budgets) before publishing.
- Draft and continuously update the five Markdown reports inside
- Community Activation & Review
- Convert report highlights into teach-ins, handouts, or Signal briefs for journalists, activists, organizers, and residents navigating arrests or ICE pressure.
- Run a
logs/safety_ethics_review.mdcheck before release to ensure no private residents are exposed and that guidance stays rights-affirming rather than escalatory.
Update this roadmap as needs evolve—each bullet should map to issues/tasks so contributors understand how their work strengthens Pueblo’s self-advocacy muscle.
- Primers help field researchers and volunteer medics spin up clean laptops/VMs before deployments so seized gear can’t reveal networks.
- Secure Communication Techniques + Non-Standard Comms pair encrypted drops (Tor + gocryptfs) with LoRa/APRS redundancies for marches where cell service or legal protections collapse.
- GrapheneOS + Mudi kit (documented under Comms & OPSEC) gives you a travel router + hardened phone chain so you can uplink livestreams or legal updates without exposing your home IP.
- Operational Security translates lessons to civilian teams: build threat models per action, enforce compartmentalized personas, and keep source notes in encrypted Obsidian vaults.
- Pueblo 81008 memo/map shows where surveillance infrastructure lives (RTCC feeds, Flock cameras) so organizers can plan ingress/egress routes that avoid persistent monitoring.
- Pueblo County Officials guide surfaces which electeds own businesses or make policy decisions affecting protest permits, jail funding, or public-records access—fuel for research requests and accountability campaigns.
When in doubt, start with the folder README to understand how each section is meant to be used in the field.
Security is about layers—no single tool protects you completely, but combining the right tools for your threat level creates meaningful protection. We've organized our security guidance into a progressive system that scales with your needs.
| Layer | Tools | Use Case |
|---|---|---|
| 1. Browser | Hardened Firefox, uBlock Origin, containers | Daily research, reading agendas, general OSINT |
| 2. Network | VPN (Mullvad/ProtonVPN), Tor Browser | Anonymized research, sensitive searches |
| 3. Isolation | Virtual Machines (TraceLabs, Kali, Whonix) | Handling untrusted files, deep research |
| 4. Hardware | Mudi router + Blue Merle, GrapheneOS | Field deployment, protests, documentation |
| 5. Communications | Signal, encrypted Obsidian vaults | Coordination, sharing findings securely |
Start with Layer 1, add layers as your threat model requires.
For complete setup guides, threat model analysis, and practical workflows (researching city agendas, documenting protests, handling CORA requests), see:
Operational Security Layers (Full Guide)
The guide includes:
- Step-by-step setup for each layer
- Tool recommendations with security criteria
- VM configurations for OSINT research
- Mudi router + Blue Merle IMEI randomization
- Signal best practices for group security
- Practical workflows tied to Pueblo-specific threats
